Koniku Kore computer could sniff out explosives

The neuron-based device was built by Nigerian Oshi Agabi and shown off at TEDGlobal

A computer based on mice neurons has been revealed that can "smell" explosives in the same way dogs can detect cancer in their human counterparts, making it a vital piece of kit for the computing world.

Nigerian researcher Oshi Agabi developed the Koniku Kore technology that he believes could be the basis of AI and computing of the future, reverse-engineering biology to make a computer as smart as a human - or mouse, in this case - for detecting hostile environments.

Announced at the TEDGlobal conference taking place in Tanzania, he explained that although machines are very good at processing millions of mathematical equations concurrently, faster and more accurately than a human, nothing comes close to the brain's cognitive functions.

He set out to combine the key features of the human brain with silicon to develop a smart machine that can, in this case, detect smells and alert users. 

"Biology is technology. Bio is tech," he told attendees at the conference. "Our deep learning networks are all copying the brain....You can give the neurons instructions about what to do - in our case, we tell it to provide a receptor that can detect explosives."

Agabi explained the neurons used to develop the technology have been taken out of the lab and will survive for months. However, he has complete faith that such technology could be used with a much longer shelf life in future.

"We think that the processing power that is going to run the robots of the future will be synthetic biology-based and we are laying the foundations for that today," he said.

Although it's only a concept at present (although it does actually work to a very sophisticated degree), Agabi explained that it could be used for a wide array of functions, including at airport security gates and other places where bombs are a real threat to human life.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020